ack

Results 6426 - 6450 of 6552Sort Results By: Published Date | Title | Company Name
Published By: MeQuilibrium     Published Date: Jul 25, 2018
In today’s competitive work environment, attracting and retaining top talent is paramount and expensive. Companies recruit high performing employees with deep experience, invest in training, and reward outcomes. Yet while talent and experience are critical, new evidence suggests those attributes may not be enough. It’s not simply how well a person can perform in a typical situation, but how quickly they can return to high performance after an inevitable setback. Resilience is the ability to become strong, healthy or successful again after something bad happens. It includes (learnable) cognitive and emotional skills that reduce the degree and duration of episodes of discouragement, reluctance or defeat that often follow negative events. A resilient worker will quickly put the event in perspective and search for alternative solutions while their less-resilient colleagues experience a letdown or assign blame. This paper describes how resilience, measured by the meQ Score, corresponds to w
Tags : 
    
MeQuilibrium
Published By: BlackBerry     Published Date: Mar 12, 2013
In this case study, Ricoh Canada’s Director of Infrastructure and Operations speaks about his enthusiasm for BlackBerry® 10 devices, his findings after testing BlackBerry® Enterprise Service 10 and plans to port service to the Blackberry platform.
Tags : 
ricoh canada, blackberry 10, choosing enterprise, enterprise feedback, blackberry 10 platform, knowledge management, business technology
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
Ricoh Canada’s Director of Infrastructure and Operations speaks about his enthusiasm for BlackBerry® 10 devices, his findings after testing BlackBerry® Enterprise Service 10, and plans to port a field service application to the new platform.
Tags : 
enterprise feedback, choosing blackberry 10, ricoh canada, case study, enterprise case study, knowledge management, business technology
    
Blackberry
Published By: HPE     Published Date: Feb 11, 2015
According to ESG’s 2014 IT Spending Intentions Survey, improving data backup and recovery is the most often mentioned priority for midmarket organizations for the third year in a row. It is the third most frequently cited priority by enterprises and midmarket organizations overall. Additionally, business continuity and disaster recovery (BC/DR) also appear in the top-ten priority lists of both midmarket and enterprise respondents.
Tags : 
    
HPE
Published By: Anaplan     Published Date: Mar 12, 2019
Old-school planning and budgeting can’t keep up In disruptive times, innovating and responding to change requires visibility into business conditions—and reliable planning and forecasting. However, it’s not always easy figuring out which cloud-based corporate performance management (CPM) system will best fit your budgeting, planning, analysis, and reporting needs. In this report, you will gain insight into: -The drawbacks of old-school, manual budgeting and planning -Benefits of cloud-based performance management systems -Four evaluation criteria for selecting cloud-based CPM technology
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Mar 12, 2019
Old-school planning and budgeting can’t keep up In disruptive times, innovating and responding to change requires visibility into business conditions—and reliable planning and forecasting. However, it’s not always easy figuring out which cloud-based corporate performance management (CPM) system will best fit your budgeting, planning, analysis, and reporting needs. In this report, you will gain insight into: • The drawbacks of old-school, manual budgeting and planning • Benefits of cloud-based performance management systems • Four evaluation criteria for selecting cloud-based CPM technology
Tags : 
    
Anaplan
Published By: Scripted     Published Date: Jun 03, 2014
Many businesses outsource content because they’re stretched for time. In fact, according to the Content Marketing Institute’s 2014 benchmark report, 69 percent of B2B marketers said a “lack of time” was the biggest challenge they face to date. But time isn’t the only reason why nearly 47 percent of marketers have turned to outsourcing. Here’s why the savvy ones in the business are outsourcing their content right now (and why you should be, too).
Tags : 
scripted, content marketing, content creation, lead generation, content strategy, external writing teams, marketing
    
Scripted
Published By: Project Success, Inc.     Published Date: Jun 23, 2008
For some projects, tracking actuals is unnecessary or is not worth the effort required. In other cases, however, tracking actual costs and resource usage is an essential aspect of the project control function. Why then is tracking actual costs and resource usage on a project ever worth the effort required to accomplish it?
Tags : 
project management, project success, psi
    
Project Success, Inc.
Published By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
The primary objective of any financial transformation project is to achieve process improvements by improving the quality, effectiveness and efficiency of financial information, ultimately enhancing shareholder value. Take the example of the close process. It would be incredibly simple to shorten the process by adding more people, however, is this an efficient way to reduce the number of days to close? On the right, the Hackett Group displays that best in class companies actually can be seen closing in fewer days, with greater automation and significant lower audit fees, emphasizing the idea that you really can do more with less.
Tags : 
account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software
    
Trintech EMEA ABM Pilot
Published By: Datex     Published Date: Oct 11, 2010
For companies offering time critical services, the ability to access information and packages quickly can result in time and labor savings and improve customer satisfaction.
Tags : 
software, courier, warehouse, logistics, wms
    
Datex
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Simple voicemail has evolved into complex integrated messaging platforms and the generic black handset has been replaced by a plethora of devices. Service providers can become critical partners for companies looking to ensure availability of their voice network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Logicworks     Published Date: Jan 27, 2014
In this whitepaper, you will learn how to overcome 3 fundamental problems that organizations face in the context of managing their backup windows.
Tags : 
logicworks, backup, backup window, back-as-a-service, baas, restores, archiving, cloud
    
Logicworks
Published By: Epicor     Published Date: Nov 19, 2018
When determining which investments to make in their technology infrastructure, businesses sometimes choose to make no changes at all. While this decision avoids short-term costs and business disruption, it means the risk of reliance on obsolete technology. The cost of doing nothing is expensive in the long term. This eBook outlines exactly what is at stake for LBM businesses that wait to adopt modern technology. Download and learn how much your old system is costing your business. You’ll understand how an up-to-date solution like Epicor Bistrack helps build a path toward increased sales and profits.
Tags : 
    
Epicor
Published By: IBM     Published Date: Oct 24, 2013
In this paper, you will learn how to get management to understand why an investment in a planning tool is essential.
Tags : 
ibm, planning tool, sell the concept, senior management team, ibm software, rule of 100, forecasting model, spreadsheet application
    
IBM
Published By: F5 Networks Inc     Published Date: May 03, 2017
Building out a dedicated infrastructure with the agility, scalability, and effciency of a public cloud—while enjoying increased levels of control and security—can help enterprises boost agility and improve operational ef?ciency. However, while most private cloud networking services provide basic load balancing functionality, they lack important application delivery features, putting the performance, availability, and security of applications at risk. As private clouds increasingly host mission-critical production applications, advanced application delivery services for layers 4 through 7 are becoming essential. End-to-end integration, orchestration, and automation of the needed application delivery networking and security services are also critical to improve application time-to-market and operational ef?ciency.
Tags : 
cloud, cloud security, efficiency, security, public cloud
    
F5 Networks Inc
Published By: Proofpoint     Published Date: Apr 06, 2012
Download this white paper from Osterman Research and Proofpoint to learn how the protection of corporate data from sophisticated malware and phishing attacks is at top of mind of IT decision makers.
Tags : 
cloud-based security, advanced persistent threat, threat protection, cloud security, phishing, malware, anti-malware, security
    
Proofpoint
Published By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : 
web monitoring, gfi, osterman, messaging, directory, email, e-mail, directories
    
Osterman Research, Inc.
Published By: Rackspace     Published Date: Mar 08, 2016
Why you should care about Identity-as-a-Service (IDaaS): An Expert’s perspective
Tags : 
organization, identity solutions, cloud management, access management
    
Rackspace
Published By: Freshdesk     Published Date: Aug 15, 2016
While email is perfect for one-to-one communication, it doesn't work half as well for managing many-to-many conversations like a helpdesk would. When businesses use email to support customers, they leave room for conversations to get lost, ignored or forgotten. Not to mention, the lack of accountability and metrics to gauge the process and figure out what's working and what's not working. In this whitepaper, we discuss, for those businesses, the advantages a helpdesk has over email and lay out just how easy it can be to win customer love.
Tags : 
    
Freshdesk
Published By: IBM     Published Date: Nov 30, 2017
Analyst firm, Enterprise Strategy Group (ESG), makes the case for storing backup, archive and content repository data in the cloud. Learn how IBM Cloud Object Storage addresses these use cases and helps companies lower costs, provide higher availability and protect against unauthorized access to their data. Complete the form to download the analyst paper
Tags : 
ibm cloud, archival solutions, ibm, it services, storage, production storage, data management
    
IBM
Published By: iCims     Published Date: Jan 24, 2017
The decision to keep your current applicant tracking system (ATS for short) or switch to a new ATS, is often a difficult one to make. Switching to a new applicant tracking system can be costly and a perceivable headache to implement. However, when you find an ATS that meets your company’s unique needs while providing resources to help your company both today and tomorrow; then switching could be the best decision your company makes. The right applicant tracking system should provide solutions to your most common pain points, saving you time, money, and energy.
Tags : 
    
iCims
Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection
    
Webroot Inc
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. That’s why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations need—hybrid data protection media and mechanisms.
Tags : 
    
Carbonite
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
One of the few places that pervasive Wi-Fi is not found these days is in US Federal Government office buildings and military bases. Government IT departments explain this lack of modern technology by pointing to Information Assurance (IA) departments who block their planned deployments because of security concerns. IA departments, on the other hand, point to unclear rules, regulations, and policies around Wi-Fi use which prevent them from making informed risk decisions.
Tags : 
government it, modern technology, data security, risk reduction
    
Hewlett Packard Enterprise
Start   Previous    249 250 251 252 253 254 255 256 257 258 259 260 261 262 263    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.